Abstract:
Disclosed herein are systems, methods, and computer-readable storage media for managing a packet network to deal with a problem of dropped audio packets. A triggering event signal indicates that audio marked packet traffic in the packet network has exceeded a capacity limit. Upon receiving the triggering event signal, a transmitting device transmits audio packets marked as non-audio packets through the packet network. The transmitting device, for example, is a VoIP telephone. The triggering event signal, for example, is generated when the audio marked packet traffic exceeds a dropped packet threshold, or when monitoring of audio marked packet traffic indicates that audio marked packet traffic approaches a committed data rate (CDR) threshold.
Abstract:
A technique is discloses that enables a first telecommunications terminal, wireless or otherwise, to report to its user whether a second, wireless telecommunications terminal is receiving the first terminal's packet stream transmissions at a satisfactory quality level. The second terminal receives the packet stream that conveys the media waveform transmitted by the first terminal. The media waveform can be that of the speech signal of the first terminal's user. The second terminal measures a trait of the received signal and encodes the measurement data into the packet stream that the second terminal is already transmitting to the first terminal. The first terminal then decodes the measurement data from the received second stream and presents, to its user, a quality indication that is based on the measurement data. In doing so, the first terminal provides its user with a better idea of whether the second terminal has reliably received the user's communication.
Abstract:
A communication session is established between a first communication endpoint and a second communication endpoint. A determination of a network condition is made, such as determining a type of network impairment. In response to determining the network condition, a message is sent to the second communication endpoint that requests the second communication endpoint to change a process for sending packets in the communication session. The process for changing packets can include: having the second communication endpoint send the same packets in the communication session at least twice; having the second communication endpoint use a different packet priority value for the communication session; having the second communication endpoint switch from a connection oriented protocol to a connectionless protocol for the communication session; and having the second communication endpoint switch from the connectionless protocol to the connection oriented protocol for the communication session.
Abstract:
A user interaction or a timer event is detected in a communication device. A timestamp is associated with the user interaction or the timer event. In response to detecting the user interaction or the timer event in the communication device, the user interaction or the timer event and the timestamp are stored in a packet log file associated with the communication device. The packet log file can also include a packet trace of packets that are sent to and received by the communication device. This allows the user interactions and/or the timer events to be displayed chronologically in relation to the packets sent to and received by the communication device.
Abstract:
A communication session is established between a first communication endpoint and a second communication endpoint. A determination of a network condition is made, such as determining a type of network impairment. In response to determining the network condition, a message is sent to the second communication endpoint that requests the second communication endpoint to change a process for sending packets in the communication session. The process for changing packets can include: having the second communication endpoint send the same packets in the communication session at least twice; having the second communication endpoint use a different packet priority value for the communication session; having the second communication endpoint switch from a connection oriented protocol to a connectionless protocol for the communication session; and having the second communication endpoint switch from the connectionless protocol to the connection oriented protocol for the communication session.
Abstract:
Disclosed herein are systems, methods, and computer-readable storage media for managing a packet network to deal with rogue applications that produce non-audio packets marked as audio packets. The system analyzes packet flow through the network to identify an unauthorized source of non-audio packets marked as audio packets, and upon identifying the unauthorized source, the system stops subsequent unauthorized transmission of non-audio packets marked as audio packets from the identified unauthorized source. For example, such an unauthorized source is identified by finding that an audio marked packet has a source address that is not found on a list of authorized sources, or by detecting atypical patterns of audio queue utilization, or by determining whether audio marked packets from a source exceed a threshold value related to transmission of audio marked packets.
Abstract:
Systems, methods, and non-transitory computer-readable storage media for implementing real-time transport control protocol (RTCP) to obtain end-to-end session information. The system receives an RTCP extension that is associated with an RTCP packet in a communication session. The RTCP extension may include an instruction for transmitting RTCP data based on a triggering event. The RTCP extension can be configured to propagate along the communication session. Next, in response to the triggering event, the system can transmit the RTCP data to an address defined by the instruction as a destination address for receiving information associated with the triggering event.
Abstract:
A user interaction or a timer event is detected in a communication device. A timestamp is associated with the user interaction or the timer event. In response to detecting the user interaction or the timer event in the communication device, the user interaction or the timer event and the timestamp are stored in a packet log file associated with the communication device. The packet log file can also include a packet trace of packets that are sent to and received by the communication device. This allows the user interactions and/or the timer events to be displayed chronologically in relation to the packets sent to and received by the communication device.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for determining rogue traffic using flow statistics and a list of authorized media engines. A system configured according to this disclosure receives data associated with a group of packets in a media queue, such as the source network address where the packets originated, the destination network address for the packets, and an indication of an associated queue for the packets. The system then verifies the data received by comparing the source network address to a list of network addresses of known media engines. The system further verifies that the indication of an associated queue for the packets is correct for the packets. Should the system detect failure in the verification of known media engines or the verification of indication of associated queues, the system generates a notification.